CN115242702B - Internet of things node optimal path planning method and system - Google Patents

Internet of things node optimal path planning method and system Download PDF

Info

Publication number
CN115242702B
CN115242702B CN202211155567.7A CN202211155567A CN115242702B CN 115242702 B CN115242702 B CN 115242702B CN 202211155567 A CN202211155567 A CN 202211155567A CN 115242702 B CN115242702 B CN 115242702B
Authority
CN
China
Prior art keywords
node
array
internet
nodes
things
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211155567.7A
Other languages
Chinese (zh)
Other versions
CN115242702A (en
Inventor
李昕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Youkegu Technology Co ltd
Original Assignee
Guangzhou Youkegu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Youkegu Technology Co ltd filed Critical Guangzhou Youkegu Technology Co ltd
Priority to CN202211155567.7A priority Critical patent/CN115242702B/en
Publication of CN115242702A publication Critical patent/CN115242702A/en
Application granted granted Critical
Publication of CN115242702B publication Critical patent/CN115242702B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/14Routing performance; Theoretical aspects
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/44Distributed routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention provides a method and a system for planning an optimal path of a node of an Internet of things, which comprises the following contents: initializing global parameters of the whole network: the node sequence number, the public key and private key pair C and the distance matrix D; secondly, the sending node reads the matrix parameters between the sending node and the target node; (III) judging whether the matrix parameters are infinite, if so, executing the step (IV), otherwise, executing the step (V); fourthly, the sending node initializes the message array and sends the message array to all the adjacent nodes; all adjacent nodes verify the correctness of the message array, update the distance matrix and send the updated message array to the adjacent nodes; when the target node receives the message array, checking the correctness of the message array, and updating the matrix distance; sending the updated message array to the whole network node, and ending the routing; and (V) calculating the shortest routing path between the sending node and the target node, if the shortest routing path is directly sent, directly sending, and if not, executing the step (IV).

Description

Internet of things node optimal path planning method and system
Technical Field
The invention relates to the technical field of Internet of things, in particular to a method and a system for planning an optimal path of a node of the Internet of things.
Background
The development of the internet of things technology enables the scheduling and management of the human society to develop towards intellectualization and humanization, and people can be free from complicated repeated work to engage in higher-level thinking and creative activities. Because most of the internet of things equipment has single functions and relatively poor hardware processing performance, bandwidth resources inside the internet of things are utilized to the maximum extent, and an important promotion effect is played on efficient operation of the internet of things.
The low power consumption characteristic of the internet of things equipment requires that an efficient routing strategy is required for data exchange between the equipment, so that data can be sent from a starting point to a destination as soon as possible. In the current routing algorithm, a local routing table is often set in a core node, a next node in a data forwarding process is recorded, and once the next node is recorded, a forwarding relation is rarely changed. The method is particularly suitable for networks with stable network topologies, such as a backbone network, and the like, and can enable the data packet to be forwarded along a near-optimal path. However, for a distributed network such as the internet of things, especially for a scene in which the topological relation between nodes in the network frequently changes, the deficiency of the method is highlighted. For example, the power supply shortage of the node may cause the original routing relation to be interrupted, and the movement of the node may cause the original optimal path to become a time-consuming path.
Disclosure of Invention
The invention aims to provide an optimal path planning method for nodes of the Internet of things.
In order to realize the purpose, the technical scheme is as follows:
an Internet of things node optimal path planning method comprises the following steps:
s1, assigning sequence numbers to all nodes in an Internet of things, wherein the number of the nodes is N, and the sequence numbers are 1, 2, \\ 8230and N respectively; a public key and a private key pair are stored in the node, the public key is open to the outside, and the private key node is stored by itself; maintaining a matrix data structure D in the node, wherein the matrix data structure D is an N-row and N-column matrix on a real number field R, and elements in the matrix data structure D are represented asD i,j =(d i,j ,p i,j , n i,j ,e i,j ),d i,j Representing nodesiTo nodejThe communication duration is counted in one way,p i,j n i,j e i,j represented as nodesiTo nodejThe statistical number of the difference between the newly measured communication time length and the historical statistical time length; if it is newIf the value of the measured communication time length is larger than the historical value, thenp i,j Adding 1; if the newly measured and calculated communication time length is smaller than the historical value, the communication time length is measuredn i,j Adding 1; if equal, thene i,j Adding 1; the initial values of the parameters are:d i,j =∞,p i,j =0,n i,j =0,e i,j =0;
s2, when the nodev 1 Needs to send message m to nodev * Time, nodev 1 Reading matrix data structure D
Figure DEST_PATH_IMAGE001
S2.1. If
Figure DEST_PATH_IMAGE002
= ∞; executing the steps S2.1.1 to S2.1.4.2;
s2.1.1. Nodev 1 Initializing dynamic message array M and sending to nodev 1 Set of all neighboring nodes ofR 1 Simultaneously initializing the first element in array MM 1 =(v 1 v * t 1 R 1 s 1 ) Wherein, in the process,t 1 is a nodev 1 The time when the array M is transmitted,s 1 is a nodev 1 Using private key pairs to exclude fields within array Ms 1 All other fields except the field are signed to obtain a digital signature;
s2.1.2. Current nodev k+1 When receiving the array M, judging whether the array M belongs to the set or notR k If not, the array M is lost, and if yes, the signature checking operation is executed on each element in the array M;
s2.1.3. Recording nodev k+1 Time of receiving array Mt k+1 Read outM k Inside oft k CalculatingΔt k = t k+1 - t k Based onΔt k Updating
Figure DEST_PATH_IMAGE003
A value of (d);
s2.1.4. Generating an arrayM k+1
S2.1.4.1. Ifv k+1 v * Then, thenM k+1 =(v k+1 t k+1 R k+1 s k+1 ) Sending the array M to the nodev k+1 Of (2) a neighboring node setR k+1
S2.1.4.2. Ifv k+1 =v * Then, thenM k+1 =(v k+1 t k+1 s k+1 ) When message m arrives at the target nodev *
S2.2. If
Figure 472210DEST_PATH_IMAGE002
If not equal to infinity, the node is obtainedv 1 To the nodev * Communication path (2):
Figure DEST_PATH_IMAGE004
Figure DEST_PATH_IMAGE005
Figure DEST_PATH_IMAGE006
(ii) a If it is
Figure DEST_PATH_IMAGE007
Then nodev 1 Direct messaging to nodesv * (ii) a Otherwise executeS2.1.1-S2.1.4.2;
M k representing the kth element in the array M;t k+1 representing nodesv k+1 The time when the array M is sent;R k+1 representing nodesv k+1 A set of all neighboring nodes of (a);s k+1 representing nodesv k+1 Using private key pairs to exclude fields within array Ms k+1 All other fields except the field are signed to obtain a digital signature.
Preferably, thed i,j >0,p i,j n i,j e i,j Is 0 or a positive integer.
Preferably, the matrix data structure D is represented as:
Figure DEST_PATH_IMAGE008
preferably, in the step s2.1.1, if the node is a nodev 1 Of all neighboring nodesR 1 Comprising a nodev * Then the node is connectedv * From the setR 1 Is removed.
Preferably, the nodes in the internet of things maintain a mapping table C for mapping the node serial numbers and the node public keys; the step S2.1.2 executes signature verification operation on each element in the array M, and comprises the following steps:
find node from mapping table Cv u And using the public key to pair elements in array MM u Performing a signature verification operation on the elementsM u If the signature is not checked, discarding the array M until all elements in the array M pass the signature checking operation;
Figure DEST_PATH_IMAGE009
preferably, said step S2.1.3 is based onΔt k Updating
Figure 162561DEST_PATH_IMAGE003
The values of (a) specifically include:
if it isΔt k =
Figure DEST_PATH_IMAGE010
Then, thene k,k+1 Plus 1, update
Figure DEST_PATH_IMAGE011
Wherein
Figure DEST_PATH_IMAGE012
Is composed of
Figure 288911DEST_PATH_IMAGE003
The value of the value after the update is,
Figure DEST_PATH_IMAGE013
alpha, beta are default constants, alpha>0,0<β<1;
If it isΔt k <
Figure DEST_PATH_IMAGE014
Then, thenn k,k+1 Add 1, update
Figure DEST_PATH_IMAGE015
Gamma, delta are default constants, gamma>0,0<δ<1;
If it isΔt k >
Figure 365320DEST_PATH_IMAGE014
Then, thenp k,k+1 Add 1, update
Figure DEST_PATH_IMAGE016
,ε、
Figure DEST_PATH_IMAGE017
Is a default constant,. Epsilon>0,0<
Figure 189620DEST_PATH_IMAGE017
<1。
Preferably, in step s2.1.4.2, the message m is sent to the target nodev * Rear, nodev * Using array M full-network broadcast as nodev 1 To the nodev k Trusted credentials for modifications to the matrix data structure D.
Meanwhile, the invention also provides an Internet of things node optimal path planning system, which comprises the following specific scheme: the method comprises the steps of executing the optimal path planning method for the nodes of the Internet of things when all the nodes in the Internet of things transmit messages.
Compared with the prior art, the invention has the beneficial effects that:
(1) The method provided by the invention designs a routing algorithm for dynamically adjusting the communication distance between the nodes, and adapts to a scene with a variable distributed network topology structure.
(2) The method provided by the invention enhances the reliability of system parameters based on the digital signature tamper-resistant routing strategy.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic flowchart of a method for planning an optimal path of a node of the internet of things in embodiment 1.
Fig. 2 is a schematic structural diagram of the optimal path planning system for the nodes of the internet of things in embodiment 2.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Fig. 1 is a schematic flow chart of the method for planning the optimal path of the node of the internet of things provided by the invention. As shown in fig. 1, the method for planning the optimal path of the node of the internet of things provided by the invention comprises the following steps:
initializing global parameters of the whole network: the node sequence number, the public key and private key pair C and the distance matrix D;
secondly, the sending node reads the matrix parameters between the sending node and the target node;
(III) judging whether the matrix parameters are infinite, if so, executing the step (IV), otherwise, executing the step (V);
fourthly, the sending node initializes the message array and sends the message array to all the adjacent nodes; all adjacent nodes verify the correctness of the message array, update the distance matrix and send the updated message array to the adjacent nodes; when the target node receives the message array, checking the correctness of the message array, and updating the matrix distance; sending the updated message array to the whole network node, and ending the routing;
and (V) calculating the shortest routing path between the sending node and the target node, if the shortest routing path is directly sent, directly sending, and if not, executing the step (IV).
In the step (one), all nodes in the Internet of things are endowed with serial numbers, the number of the nodes is N, and the serial numbers are 1, 2, \8230;, and N respectively; a public key and a private key pair are stored in the node, the public key is open to the outside, and the private key node is stored by itself; maintaining a matrix data structure D in the node, wherein the matrix data structure D is an N-row and N-column matrix on a real number field R, and elements in the matrix data structure D are represented asD i,j =(d i,j , p i,j , n i,j ,e i,j ),d i,j Representing nodesiTo the nodejThe communication duration is counted in one way,p i,j n i,j e i,j represented as nodesiTo the nodejThe statistical number of the difference between the newly measured communication time length and the historical statistical time length; if the newly measured and calculated communication duration value is larger than the historical value, the communication duration value is calculatedp i,j Adding 1; if the newly measured and calculated communication time length is smaller than the historical value, the communication time length is measuredn i,j Adding 1; if they are equal, thene i,j Adding 1; the initial values of the parameters are:d i,j =∞,p i,j =0,n i,j =0,e i,j =0。
wherein, thed i,j >0,p i,j n i,j e i,j Is 0 or a positive integer.
The matrix data structure D is represented as:
Figure 99807DEST_PATH_IMAGE008
in the step (II), when the node isv 1 Needs to send message m to nodev * Time, nodev 1 Reading matrix data structure D
Figure 556196DEST_PATH_IMAGE001
In the above step (III), judgment is made
Figure 577242DEST_PATH_IMAGE002
And (4) judging whether the current is infinite, if so, executing the step (four), otherwise, executing the step (five).
In the step (iv), the specific operation steps are as follows:
s2.1.1. Nodev 1 InitialChanging dynamic message array M and sending it to nodev 1 Set of all neighboring nodes ofR 1 Simultaneously initializing the first element in array MM 1 =(v 1 v * t 1 R 1 s 1 ) Wherein, in the step (A),t 1 is a nodev 1 The time when the array M is transmitted,s 1 is a nodev 1 Using private keys to exclude fields within array Ms 1 All other fields except the field are signed to obtain a digital signature;
s2.1.2. Current nodev k+1 When receiving the array M, judging whether the array M belongs to the set or notR k If not, the array M is lost, and if yes, the signature checking operation is executed on each element in the array M;
s2.1.3. Recording nodev k+1 Time of receiving array Mt k+1 Read outM k Inside oft k CalculatingΔt k = t k+1 - t k Based onΔt k Updating
Figure 671362DEST_PATH_IMAGE003
A value of (d);
s2.1.4. Generating arrayM k+1
S2.1.4.1. Ifv k+1 v * Then, thenM k+1 =(v k+1 t k+1 R k+1 s k+1 ) Sending the array M to the nodev k+1 Of (2) a neighboring node setR k+1
S2.1.4.2. Ifv k+1 =v * Then, thenM k+1 =(v k+1 t k+1 s k+1 ) When the message m reaches the target nodev *
Wherein, in step S2.1.1, if the node isv 1 Of all neighboring nodesR 1 Comprising a nodev * Then the node is connectedv * From the collectionR 1 Is removed.
The nodes in the Internet of things maintain a mapping table C for mapping node serial numbers and node public keys; the step S2.1.2 is to execute the signature verification operation on each element in the array M, and comprises the following steps:
find node from mapping table Cv u And using the public key to pair elements in array MM u Performing signature checking operation, if the element isM u If the signature is not checked, discarding the array M until all elements in the array M pass the signature checking operation;
Figure 486871DEST_PATH_IMAGE009
wherein said step S2.1.3 is based onΔt k Updating
Figure 696136DEST_PATH_IMAGE003
The values of (a) specifically include:
if it isΔt k =
Figure 255293DEST_PATH_IMAGE010
Then, thene k,k+1 Add 1, update
Figure 968034DEST_PATH_IMAGE011
Wherein
Figure 688866DEST_PATH_IMAGE012
Is composed of
Figure 119847DEST_PATH_IMAGE003
The value of the value after the update is,
Figure 981230DEST_PATH_IMAGE013
alpha, beta are default constants, alpha>0,0<β<1;
If it isΔt k <
Figure DEST_PATH_IMAGE018
Then, thenn k,k+1 Plus 1, update
Figure 610795DEST_PATH_IMAGE015
Gamma, delta are default constants, gamma>0,0<δ<1;
If it isΔt k >
Figure 502527DEST_PATH_IMAGE010
Then, thenp k,k+1 Add 1, update
Figure 420805DEST_PATH_IMAGE016
,ε、
Figure 587344DEST_PATH_IMAGE017
Is a default constant, ε>0,0<
Figure 9098DEST_PATH_IMAGE017
<1。
Wherein, in the step S2.1.4.2, the message m is sent to the target nodev * Rear, nodev * Using array M full-network broadcast as nodev 1 To nodev k Trusted credentials for modifications to the matrix data structure D.
In the step (v), the specific operation steps are as follows:
node calculationv 1 To nodev * Communication path (2):
Figure 838776DEST_PATH_IMAGE004
Figure 978770DEST_PATH_IMAGE005
Figure DEST_PATH_IMAGE019
(ii) a If it is
Figure 480159DEST_PATH_IMAGE007
Then nodev 1 Direct messaging to nodesv * (ii) a Otherwise, the steps S2.1.1 to S2.1.4.2 are executed.
Example 2
The embodiment provides an optimal path planning system for nodes of the internet of things, as shown in fig. 2, a specific scheme of the system is as follows: the method comprises the steps of executing the method for planning the optimal path of the nodes of the Internet of things in the embodiment 1 when all the nodes in the Internet of things transmit messages.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, an optical disk, or other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. An Internet of things node optimal path planning method is characterized by comprising the following steps: the method comprises the following steps:
s1, assigning sequence numbers to all nodes in an Internet of things, wherein the number of the nodes is N, and the sequence numbers are 1, 2, \\ 8230and N respectively; a public key and a private key pair are stored in the node, the public key is open to the outside, and the private key node is stored by itself; maintaining a matrix data structure D in the node, wherein the matrix data structure D is an N-row and N-column matrix on a real number field R, and an element table in the matrix data structure DShown asD i,j =(d i,j , p i,j ,n i,j ,e i,j ),d i,j Representing nodesiTo the nodejThe communication duration is counted in one way,p i,j n i,j e i,j represented as nodesiTo nodejThe statistical number of the difference between the newly measured communication time length and the historical statistical time length; if the newly measured and calculated communication duration value is larger than the historical value, the communication duration value is calculatedp i,j Adding 1; if the newly measured and calculated communication time length is less than the historical value, the new measured and calculated communication time length is calculatedn i,j Adding 1; if equal, thene i,j Adding 1; the initial values of the parameters are:d i,j =∞,p i,j =0,n i,j =0,e i,j =0;
s2, when the nodev 1 Needs to send message m to nodev * Time, nodev 1 Reading matrix data structure D
Figure 580184DEST_PATH_IMAGE001
S2.1. If
Figure 106980DEST_PATH_IMAGE002
= ∞; executing the steps S2.1.1 to S2.1.4.2;
s2.1.1. Nodev 1 Initializing dynamic message array M and sending to nodev 1 Set of all neighboring nodes ofR 1 Simultaneously initializing the first element in array MM 1 =(v 1 v * t 1 R 1 s 1 ) Wherein, in the step (A),t 1 is a nodev 1 The time when the array M is transmitted,s 1 is a nodev 1 Using private key pairs to exclude fields within array Ms 1 All other fields except the field are signed to obtain a digital signature;
s2.1.2. Current nodev k+1 When receiving the array M, judging whether the array M belongs to the set or notR k If not, the array M is lost, and if yes, the signature checking operation is executed on each element in the array M;
s2.1.3. Recording nodev k+1 Time of receiving array Mt k+1 Read outM k Inside (A)t k CalculatingΔt k = t k+1 - t k Based onΔt k Updating
Figure 277323DEST_PATH_IMAGE003
A value of (d);
s2.1.4. Generating arrayM k+1
S2.1.4.1. Ifv k+1 v * Then, thenM k+1 =(v k+1 t k+1 R k+1 s k+1 ) Sending the array M to the nodev k+1 Set of neighboring nodes ofR k+1
S2.1.4.2. Ifv k+1 =v * Then, thenM k+1 =(v k+1 t k+1 s k+1 ) When the message m reaches the target nodev *
S2.2. If
Figure 67425DEST_PATH_IMAGE002
If not equal to infinity, the node is obtainedv 1 To the nodev * Communication path (2):
Figure 149650DEST_PATH_IMAGE004
Figure 417821DEST_PATH_IMAGE005
Figure 206785DEST_PATH_IMAGE006
(ii) a If it is
Figure 964526DEST_PATH_IMAGE007
Then nodev 1 Direct messaging to nodesv * (ii) a Otherwise, executing the step S2.1.1 to S2.1.4.2;
M k representing the kth element in the array M;t k+1 representing nodesv k+1 The time when the array M is sent;R k+1 representing nodesv k+1 A set of all neighboring nodes of (a);s k+1 representing nodesv k+1 Using private key pairs to exclude fields within array Ms k+1 All other fields except the field are signed to obtain a digital signature.
2. The Internet of things node optimal path planning method according to claim 1, characterized in that: the above-mentionedd i,j >0,p i,j n i,j e i,j Is 0 or a positive integer.
3. The Internet of things node optimal path planning method according to claim 1, characterized in that: the matrix data structure D is represented as:
Figure 704686DEST_PATH_IMAGE008
4. the internet of things node of claim 1The optimal path planning method is characterized by comprising the following steps: in the step S2.1.1, if the node is a nodev 1 Set of all neighboring nodes ofR 1 Comprising a nodev * Then the node is connectedv * From the setR 1 Is removed.
5. The Internet of things node optimal path planning method according to claim 1, characterized in that: the nodes in the Internet of things maintain a mapping table C for mapping node serial numbers and node public keys; the step S2.1.2 is to execute the signature verification operation on each element in the array M, and comprises the following steps:
find node from mapping table Cv u And using the public key to pair elements within array MM u Performing signature checking operation, if the element isM u If the signature is not checked, discarding the array M until all elements in the array M pass the signature checking operation;
Figure 776547DEST_PATH_IMAGE009
6. the Internet of things node optimal path planning method according to claim 1, characterized in that: said step S2.1.3 is based onΔt k Updating
Figure 951177DEST_PATH_IMAGE010
The values of (a) specifically include:
if it isΔt k =
Figure 614239DEST_PATH_IMAGE012
Then, thene k,k+1 Add 1, update
Figure 874319DEST_PATH_IMAGE014
In which
Figure 484292DEST_PATH_IMAGE016
Is composed of
Figure 247849DEST_PATH_IMAGE017
The value of the value after the update is,
Figure 786540DEST_PATH_IMAGE019
alpha, beta are default constants, alpha>0,0<β<1;
If it isΔt k <
Figure 330654DEST_PATH_IMAGE012
Then, thenn k,k+1 Plus 1, update
Figure DEST_PATH_IMAGE021
Gamma, delta are default constants, gamma>0,0<δ<1;
If it isΔt k >
Figure 275476DEST_PATH_IMAGE012
Then, thenp k,k+1 Plus 1, update
Figure DEST_PATH_IMAGE023
,ε、
Figure DEST_PATH_IMAGE025
Is a default constant,. Epsilon>0,0<
Figure 955856DEST_PATH_IMAGE025
<1。
7. The Internet of things node optimal path planning method according to claim 1, characterized in that: in said step S2.1.4.2, the message m is sent to the target nodev * Rear, nodev * Using array M as nodev 1 To nodev k Trusted credentials for modifications to the matrix data structure D.
8. An Internet of things node optimal path planning system is characterized in that: the method comprises all nodes in the Internet of things, and when all the nodes in the Internet of things transmit messages, the method steps of the Internet of things node optimal path planning method according to any one of claims 1-7 are executed.
CN202211155567.7A 2022-09-22 2022-09-22 Internet of things node optimal path planning method and system Active CN115242702B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211155567.7A CN115242702B (en) 2022-09-22 2022-09-22 Internet of things node optimal path planning method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211155567.7A CN115242702B (en) 2022-09-22 2022-09-22 Internet of things node optimal path planning method and system

Publications (2)

Publication Number Publication Date
CN115242702A CN115242702A (en) 2022-10-25
CN115242702B true CN115242702B (en) 2022-12-13

Family

ID=83667343

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211155567.7A Active CN115242702B (en) 2022-09-22 2022-09-22 Internet of things node optimal path planning method and system

Country Status (1)

Country Link
CN (1) CN115242702B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017045578A1 (en) * 2015-09-16 2017-03-23 烽火通信科技股份有限公司 Topological graph optimal path algorithm with constraint conditions
CN111238481A (en) * 2020-01-21 2020-06-05 华南理工大学 Multipath planning method and system
CN111935010A (en) * 2020-08-13 2020-11-13 安徽天达网络科技有限公司 Network path optimization exploration method based on ant colony algorithm

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104079483B (en) * 2013-03-29 2017-12-29 南京邮电大学 Multistage safety routing method based on network code in a kind of Delay Tolerant Network
CN111373704B (en) * 2019-01-28 2022-03-29 北京大学深圳研究生院 Method, system and storage medium for supporting multimode identification network addressing progressive-entry IP
CN110213242B (en) * 2019-05-09 2020-09-08 浙江大学 Efficient path verification method under multi-path routing background
US11271851B2 (en) * 2020-02-10 2022-03-08 Syntropy Network Limited System and method for autonomous selection of routing paths in a computer network
CN111698728B (en) * 2020-06-15 2021-09-03 西安电子科技大学 Topology control system for dynamic network and control method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017045578A1 (en) * 2015-09-16 2017-03-23 烽火通信科技股份有限公司 Topological graph optimal path algorithm with constraint conditions
CN111238481A (en) * 2020-01-21 2020-06-05 华南理工大学 Multipath planning method and system
CN111935010A (en) * 2020-08-13 2020-11-13 安徽天达网络科技有限公司 Network path optimization exploration method based on ant colony algorithm

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Achieving Optimal Traffic Engineering Using a Generalized Routing Framework;Ke Xu等;《IEEE Transactions on Parallel and Distributed Systems》;20150115;第27卷(第1期);第51-64页 *
一种基于蚁群的机会网络多目标路由算法;王海泉等;《系统仿真学报》;20130108;第25卷(第01期);第116-119页 *

Also Published As

Publication number Publication date
CN115242702A (en) 2022-10-25

Similar Documents

Publication Publication Date Title
Kleinrock et al. Hierarchical routing for large networks performance evaluation and optimization
JP2000115243A (en) Packet repeater and multi-cast speedup system
CN109639579B (en) Multicast message processing method and device, storage medium and processor
CN107104824A (en) A kind of network topology determines method and apparatus
CN105474168B (en) The data processing method and relevant device that network equipment performs
CN109800270B (en) Data storage and query method and Internet of things system
CN107547346A (en) A kind of message transmitting method and device
US20220172180A1 (en) Method for Storing Transaction that Represents Asset Transfer to Distributed Network and Program for Same
CN109510681B (en) Reference node selection method with minimum time synchronization series of communication network
CN116962438B (en) Gradient data synchronization method, system, electronic equipment and readable storage medium
Dawadi et al. Evolutionary gaming approach for decision making of Tier‐3 Internet service provider networks migration to SoDIP6 networks
CN115242702B (en) Internet of things node optimal path planning method and system
Chandrasekaran Understanding traffic characteristics in a server to server data center network
US20210409310A1 (en) Routing Information Sending Method, Packet Sending Method, and Related Apparatus
Al-Hamadani et al. Design and implement a self-managed computer network for electronic exams and sharing
EP3442172B1 (en) Network topology system and building methods for topologies and routing tables thereof
CN108521373B (en) Multipath routing method in named data network
Chen et al. Optimal transport on supply-demand networks
CN113347255B (en) Edge server site selection deployment model and solving method thereof
CN111970202B (en) Network topology discovery method based on three-way sub-topology measurement
Smiljanić et al. A comparative review of scalable lookup algorithms for IPv6
CN109962775B (en) Quantum cipher network key generation control method
Martinez et al. On designing fast nonuniformly distributed ip address lookup hashing algorithms
CN111917901B (en) IP address addressing method in data center network BCDC
CN117061365B (en) Node selection method, device, equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant